First published: Fri Oct 20 2023(Updated: )
stb_vorbis is a single file MIT licensed library for processing ogg vorbis files. A crafted file may trigger memory write past an allocated heap buffer in `start_decoder`. The root cause is a potential integer overflow in `sizeof(char*) * (f->comment_list_length)` which may make `setup_malloc` allocate less memory than required. Since there is another integer overflow an attacker may overflow it too to force `setup_malloc` to return 0 and make the exploit more reliable. This issue may lead to code execution.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nothings STB | =1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45681 is a vulnerability in the stb_vorbis library that allows a crafted file to trigger a memory write beyond the allocated heap buffer.
CVE-2023-45681 has a severity value of 7.3, which is considered high.
The root cause of CVE-2023-45681 is a potential integer overflow in the sizeof(char*) * (f->comment_list_length) calculation, which can lead to memory write beyond the allocated heap buffer.
To fix CVE-2023-45681, it is recommended to update to a patched version of the stb_vorbis library when available.
Yes, you can find more information about CVE-2023-45681 in the following references: [Reference 1](https://securitylab.github.com/advisories/GHSL-2023-145_GHSL-2023-151_stb_image_h/) and [Reference 2](https://github.com/nothings/stb/blob/5736b15f7ea0ffb08dd38af21067c314d6a3aae9/stb_vorbis.c#L3660-L3677).